Criminal Policy making in Cyber Security Violations and Social Prevention Approaches

Document Type : Research Article

Authors

1 Ph.D Student in Criminal Law and Criminology, Maragheh Branch, Islamic Azad University, Maragheh, Iran

2 Associate Professor of Criminal Law & Criminology, Maragheh Branch, Islamic Azad University, Maragheh, Iran

Abstract

Security is the most important component in the political authority of governments and the cyber world violates it by acknowledging its valuable achievements. Therefore, developing an effective preventive criminal policy against cyber security violation is so important that neglecting it can cause the criminal system to face irreparable challenges. Despite the approval of the international document on cyber security, this paper, using the method of document analysis and a descriptive analytical method, seeks to read the strategies of Iran's cyber security order in the upstream laws and documents and examine the state of social preventive criminal policy in the laws of other countries. It seems that criminal policymaking in Iran can play a significant role, especially in the field of social preventive measures against cyber security violations. In this way, different countries have adopted several security approaches to prevent cyber security violations. Based on the findings of this research, although Iran has considered different strategies in strengthening the security foundations of cyber encounters, due to the lack of appropriate differential policy, it has not yet succeeded in adopting centralized social preventive mechanisms and efficiency in preventing cyber security violations has not been considered and the measures applied are often non-technical in nature, such as training and promotion of digital Knowledge.

Keywords


  1. Aalipour, Hassan, (2013), cyber security crimes, Master's specific partial rights booklet (study of computer crimes), Isfahan University (in Persian)
  2. African Union. 2014. African Union Convention on Cyber Security and Personal data Protection. African Union
  3. Ahmadian, Qidrat and Bloki, saleh and Searmifar, Maryam (2019). "New Strategic Concept of NATO 2010 and its Security Implication in NATO-Russia Relations", Central Asia and Caucasus Quarterly, No.8, pp.1-30 (in Persian)
  4. Alaei, Hossien (2012), Sustainable security in the twenty-year vision document of the Islamic Republic of Iran, Afaq Security Quarterly, number15, page 119-148 (in Persian)
  5. Approvals of the High Security Commission of the National Center for Cyberspace in the policy document and requirements for the development of cyberspace security in the country in (2017)
  6. Ashtarian, Kyomarth (2016), Public policy making in Iran, second edition, Tehran, Mizan publication n(in Persian)
  7. Bahremand, Hamid & Davoudi, Zulfaqar (2018), Social prevention of cyber security crimes, Studies in criminal law and criminology, number 1, page 27-46 (in Persian)
  8. Bidarvand, Mokhtar & Pourghahremani, Babak & beigi, Jamal (2019), Instagram filtering from the necessity of national security to the violation of freedom of expression as a human right from the perspective of students, The crime prevention approach quarterly, volume3, number 3, page 41-65 (in Persian)
  9. Brunot, R. (2018). United Nations Security Council Background Guide, at:
  10. Christopher C. Joyner &Catherine Lotrionte, “information warfare as international coercion: Elements of a legal framework?” European Journal of international law, Vol.12 2001: 863-864
  11. Commonwealth of Australia. (2009). National Cyber Security Strategy Australian Government.
  12. Dabbagh, soroush & Nafari, Neda (2009), Explaining the concept of good in good governance, Public Administration Journal, volume1, number 3 (in Persian)
  13. (2011). Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise
  14. German Government. (2011). National cyber security strategy, Cyber Securit Strategy for Germany Federal Ministry of interior.
  15. Ghannad, Fateme, Aligholi, Amireh (2019), Protection of privacy on the web in the light of the European law on the protection of personal data and Iran's legal system, International Web Research Conference, page 1-9 (in Persian)
  16. Grant, H. (2015). Social crime prevention in the developing world: exploring the role of police in crime prevention. Switzerland: Springer.
  17. Hasani, hasan (2018), Data Localization, Research Institute of the National Center of Virtual Space - Department of Advanced Cyberspace Sciences and Technologies, number 7 (in Persian)
  18. Hosseini, Parviz and Zarif-Manesh, Hossein (2013), comparative study of the structure of cyber defense of countries, Security Research Quarterly of Imam Hossein University, second year, number 5, pp. 41-68 (in Persian)
  19. Hossieni, Parviz (2016), Presenting a strategic model in the field of political security through compiling the experiences of the holy system of J.A. Iran based on the discourse of Velayat Faqih and the Constitution, Supreme National Defense University, Faculty of National Security, Tehran (in Persian)
  20. http://www.ccwa.org/wp-content/uploads/2018/09/UNSC-Final.pdf:1-11
  21. "Global Cybersecurity Index." https://www.itu.int/en/ITU-D/Cybersecurity /Pages/ global-cybersecurityindex. aspx (accessed .08 /05/2020)
  22. Jahanshiri, Javad, Taghipour, Reza, Pourmanafi, Abolfazl (2015), Translation of research entitled: International comparison of cyber crimes, International Police Studies Quarterly, number21, page 147-185 (in Persian)
  23. Jalali Farahani, amirhossien (2010), Cybercrime Convention and its Additional Protocol, Khorsandi publication, Tehran (in Persian)
  24. James A. Lewis Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization. Center forStrategic and International Studies
  25. Jatinder Singh, Christopher Millard, Chris Reed, Jennifer Cobbe, Jon Crowcroft. (2019), Accountability in the Internet of Things (IoT): Systems, law & ways forward, Social Science Research Network.
  26. Javan jafari, abdolreza (2010), Cyber ​​crimes and the differential approach of criminal law (looking at the Islamic Penal Code section of computer crimes, journal of knowledge and development, 17th year, number34, page 177-201 (in Persian)
  27. Javan-Jaafari, Abdolreza and Sodomandrad, Amir )2014), Preventing the situation of violation of trade secrets in the cyberspace, two-quarter volume of Economic Law Encyclopedia (Former Knowledge and Development), New Volume, Year 21, Number 6, pp. 31-50 (in Persian)
  28. Jazayeri, Seyyed Abbas, Nematollahi, Maesam, Amirian Farsani, Amin (2018), Prevention of cybercrimes and its governing restrictions, Ghanoonyar publication, volume3, number 11, page 9-24 (in Persian)
  29. Katanchi, Elnaz, Pourghahremani, Babak (2021), Cyber ​​security challenges in "ASEAN" countries, international studies publication, year 18, number 1, page 69 (in Persian)
  30. Katanchi, Elnaz, Zakeri, Reza (2018), Methods of legal confrontation with cyber attacks in international law, Bushehr Police Knowledge Quarterly, 11th year, number41, page 80-106 (in Persian)
  31. Khoshnevis, Yaser (2019), Multi-stakeholder Governan of Cyber ​​Space, cyberspace research instirute, number 3, Tehran (in Persian)
  32. Kriang, Sak, Kiti, Chaisari, translator: Translator: Sadeghi, Hossein et al (2021), General International Law of Cyberspace, Hoghoghyar publication, Tehran (in Persian)
  33. Lennard G. Kruger Internet Governance and the Domain Name System: Issuse for Congress November 18, 2016. P.1
  34. Mahmoudzade, Ebrahim, Esmaeili, Keyvan (2017), The strategic model of security protection of the cyberspace of the armed forces, nationalsecurity publication,8th year, number 30, page 203-237 (in Persian)
  35. Malekmohammadi, Hamidreza (2016), Investigating the effects of social policy on the phenomenon of crime, journal of public policy, volume3, number 3, page 179-186(in Persian)
  36. Malekomohammadi, Hamidreza (2017), public policy, Mizan publication, Tehran (in Persian)
  37. Manuel Valls. (2015). French National Digital Security Strategy. French Government
  38. Monfared, Mahboube, Jalalifarahani, Amirhossien (2012), Codes of conduct and crime prevention, criminal law research journal, year3, number2, page 105-134 (in Persian)
  39. Najafi Abrandabadi, Ali-Hossein (2012), Criminology (Prevention), produced by Mohammad Ali Babaei, in the collection of essays, by Shahram Ebrahimi, 6th edition (in Persian)
  40. Najafi Abrandabadi, Ali-Hossein (2016), Criminal policy, entry in: Encyclopaedia of economic criminal sciences, by Amirhassan Niazpour, Tehran, Mizan publication, first edition (in Persian)
  41. Nazari, Seyedghani and Jafarzadeh, Siamak and Nikkhah Sarnaghi, Reza (2021), The Role of Participatory Criminal Policy in the Prevention of Cybercrimes in Iran, Political Studies of the Islamic World, Islamic World Studies Association, 11th year, 4th issue, page 151-174 (in Persian)
  42. Pakzad, Betol (2008), cyber terrorism, doctoral dissertation in criminal law and criminology, Shahid Beheshti University, Tehran (in Persian)
  43. Pourghahremani, Babak (2017), Iran's criminal policy regarding computer crimes (Comparative study with international documents), Shahr Danesh Legal Research Institute (in Persian)
  44. Pourghahremani, Babak and Azimi, Fahima, (2018), The role of cyberspace in the development of tourism security, Proceedings of the Second National Cyber Defense Conference, East Adarbaijan, Islamic Azad University, Maragheh Branch, pp. 423-408 (in Persian)
  45. Saad, Ali (2014), An income on filtering policies of internet sites, The journal of modern media studies, volume1, number 2, page 143-159 (in Persian)
  46. Sadeqi, Hossien & Mahdavi, Naser (2020), Providing the legal framework of accountability in the operation of Internet of Things tools in the context of electronic government; Explaining the effective policy model, journal of public policy, volume 6, number 3, page 103 (in Persian)
  47. Shamlou, Baqer (2019), Rereading preventive crime policy in light of the Covid-19 pandemic and chaos theory, Journal of legal research, special letter on law and corona, page 111-142 (in Persian)
  48. Shamlou, Baqir and Kazhni-Joibari, Mehdi, (2018), obstacles to the effectiveness of strategies to prevent crimes against moral security in cyberspace, Rihafat Prevention Quarterly, second period, first issue, pp. 13-35 (in Persian)
  49. Shiri, Abbas (2017), Criminal policy making about the rights of victims, journal of public policy, volume 4, number1, page 161-175 (in Persian)
  50. Soltani, Nasrollah (2017), Towards a Cyber Convention: Streamology of Norms and Monitoring of Trends, volume1, Sepand Qalam publication (in Persian)
  51. Soltani, Nasrollah (2021), Cyber and the United Nations, cyber space research institute publication, Tehran (in Persian)
  52. Vamala, Frederik (2017), International Telecommunication Union's Guide Document in the Field of National Cyber ​​Security Strategy, translated by: Morteza Vahedi and Ali Asghar Haghiri, Defense Industries Educational and Research Institute Publications, Tehran (in Persian)
  53. Watani, Amir and Asadi, Hamid (2016), Criminal policy of the Islamic Republic of Iran in cyber crimes with an emphasis on the special features of these crimes, Islamic Law Research Journal, 17th year, number 1, page 99-126 (in Persian)
  54. Zafari, Ayoub and Forughinia, Saeed and Bavand, Musa, 2019, the effect of cyber space on the national interests of the Islamic Republic of Iran from the point of view of soft war, Bushehr Police Science Quarterly, year 11, number 41, pp. 80-106 (in Persian)